S.No. |
Title |
Author |
Pages |
View |
Google Scholar |
1 |
A Selective Fuzzy Clustering Ensemble Algorithm
|
Kai Li, Peng Li |
1-6 |
19116 |
View |
2 |
A Review: Multi-Dimensional Space-Time Multilevel Codes using Rician Fading
|
Karanvir Sidhu, Gagandeep Singh |
7-10 |
20098 |
View |
3 |
Designs and Implementation of Learning Application of Fourier Series on Mobile Phones
|
Moechammad Sarosa, Kristina Widjajanti, Deddy Bagus S., Tri Kencana Galaxy |
11-15 |
20624 |
View |
4 |
SPIHT Algorithm with Huffman Encoding for Image Compression and Quality Improvement over MIMO OFDM Channel
|
Dnyaneshwar.K, CH.Suneetha |
16-21 |
20161 |
View |
5 |
A Comparison between E-Government Ranks in Jordan and Malaysian
|
Fawzi Altaany, Mohammad Issa Al-Zoubi |
22-27 |
19477 |
View |
6 |
Multi Way Feedback Encryption Standard Ver-2(MWFES-2)
|
Asoke Nath, Debdeep Basu, Surajit Bhowmik, Ankita Bose, Saptarshi Chatterjee |
28-34 |
20150 |
View |
7 |
Root Cause Analysis and New Practical Schemes for better Accessing and Establishing of Dedicated Control Channel in Cellular Networks
|
Mohammad Rasoul Tanhatalab, Ali Azarshad, Mehrzad Olfat, Mojtaba Shakerifard |
35-46 |
20513 |
View |
8 |
Performance Analysis of Various Filters for Image Noise Removal in Different Noise Environment
|
R. Srinivas, Satarupa Panda |
47-52 |
17833 |
View |
9 |
Smartgrid: An Introduction
|
Abhas Kumar Singh, Y R Sood, Harmendra Singh, Sanjeev Kumar Gagrai |
53-57 |
22753 |
View |
10 |
Test case generation for On Board Computer Software Major Components
|
Dinesha H A, V.K Agrawal |
58-62 |
18970 |
View |
11 |
Predicting E-Business Adoption through Integrating the Constructs of the Rogers’s Diffusion of Innovation Theory Combined with Technology-Organization-Environment Model
|
Mohammad Issa Al-Zoubi |
63-73 |
17879 |
View |
12 |
Estimation of Variance of the time to recruitment under two sources of depletion
|
S.Dhivya, A.Srinivasan |
74-78 |
16776 |
View |
13 |
Mathematical model of various statements of C-type Language
|
Manoj Kumar Srivastav, Asoke Nath |
79-87 |
18380 |
View |
14 |
Generating Trust Based Recommendations for Multiple Independent Domains
|
Harmeet Kaur, Deepali Jain |
88-97 |
18191 |
View |
15 |
Low Power Implementation of Fast Fourier Transform Processor on FPGA
|
Shashank Gupta |
98-105 |
19542 |
View |
16 |
Image Classification by Combining Wavelet Transform and Neural Network
|
Dharmendra Patidar, Nitin Jain, Baluram Nagariya, Manoj Mishra |
106-110 |
19715 |
View |
17 |
Assembly of an Experimental Quad-Rotor Type UAV for Testing a Novel Autonomous Flight Control Strategy
|
Shahida Khatoon, Dhiraj Gupta, Ahmad Saad Khan |
111-120 |
15628 |
View |
18 |
Multi-dimensional Affinity Aware VM Placement Algorithm in Cloud Computing
|
Nilesh Pachorkar, Rajesh Ingle |
121-125 |
15574 |
View |
19 |
Prediction of Performance Degradation in Cloud Computing
|
Pritam Fulsoundar, Rajesh Ingle |
126-129 |
19450 |
View |
20 |
General Fault Admittance Method Solution of a Line-to-Line Fault
|
J.D. Sakala, J.S.J. Daka |
130-138 |
18368 |
View |
21 |
Sentiment Analysis of Movie Reviews using Hybrid Method of Naive Bayes and Genetic Algorithm
|
M.Govindarajan |
139-145 |
18240 |
View |
22 |
Framework for Efficient Secure Steganographic Communication over Network Protocols
|
Jasbir Singh, Lalitsen Sharma |
146-150 |
15153 |
View |
23 |
An Optimized Multikeying Chaotic Encryption for Real Time Applications
|
R. Tamijetchelvy, P. Sankaranarayanan |
151-159 |
19678 |
View |
24 |
Inverse Kinematics Using Neuro-Fuzzy Intelligent Technique for Robotic Manipulator
|
Shiv Manjaree, Vijyant Agarwal, B C Nakra |
160-165 |
20298 |
View |
25 |
Network routing problem-A simulation environment using Intelligent technique
|
Vijayalaxmi, Chandrashekara S.Adiga, H.G.Joshi, Harish S.V |
166-171 |
15127 |
View |
26 |
Instrument Cluster Driver Information Display Database and Viewer Tool
|
Adnan Shaout, Dominic Colella |
172-183 |
19308 |
View |
27 |
Search the Set of Shorter Paths Using Graph Reduction Technique
|
Tarak Nath Paul, Abhoy Chand Mondal |
184-192 |
14453 |
View |
28 |
Novel Method for Edge Detection for Gray Scale Images using VC++ Environment
|
Harsimran Singh, Tajinder kaur |
193-197 |
19516 |
View |
29 |
THD Reduction in Performance of Cascaded Multi-Level Inverter Fed Induction Motor Drive
|
Naveen Kumar Verma, Preeti Gupta, Amit Shrivastava |
198-203 |
19159 |
View |
30 |
FPGA - Based Evaluation of Power Analysis Attacks and Its Countermeasures on Asynchronous S-Box
|
G. Gokulashree, R. Ramya |
204-210 |
17462 |
View |
31 |
Interactive Image Segmentation and Edge Detection of Medical Images
|
Sameena Banu, Apparao Giduturi, Syed Abdul Sattar |
211-215 |
15820 |
View |
32 |
Exploring Security Mechanisms to Android Device
|
Chetan C.Kotkar, Pravin Game |
216-221 |
16314 |
View |
33 |
Generation of Branch Coverage Test Data for Simulink/Stateflow Models Using Crest Tool
|
Sangharatna Godboley, Adepu Sridhar,Bhupendra kharpuse , Durga Prasad Mohapatra, Banshidhar Majhi |
222-229 |
18824 |
View |
34 |
One Twenty Phase Code Design for Radar
|
E.N.V. Purna Chandra Rao, S.P Singh |
230-235 |
16155 |
View |
35 |
Semantic Web Approach towards E-Commerce
|
V.Kiran Kumar, S.Murali Mohan |
236-241 |
15871 |
View |
36 |
The EDL Effect in Microchannel Flow: A Critical Review
|
S. Kumar |
242-250 |
14984 |
View |
37 |
Content Based Image Retrieval by Multi Features using Image Blocks
|
Arpita Mathur, Rajeev Mathur |
251-255 |
14771 |
View |
38 |
An Overview on Data Mining Approach on Breast Cancer data
|
Shiv Shakti Shrivastava, Anjali Sant, Ramesh Prasad Aharwal |
256-262 |
16524 |
View |
39 |
Secure and Automated Communication in Client and Server Environment
|
Saket Gupta |
263-271 |
17473 |
View |
40 |
Fault Detection of Induction Motor Using Current and Vibration Monitoring
|
Sumit Narwade, Prasad Kulkarni, C.Y.Patil |
272-279 |
17191 |
View |
41 |
Deployment Techniques of Nodes in WSN for Multi-Domain Applications A Survey on their performance analysis
|
Mamatha G, B G Premasudha |
280-288 |
18758 |
View |
42 |
Segmentation and Canny Edge Method in MRI Brain Cyst Detection
|
Vrushali D. Dharmale, P. A. Tijare |
289-293 |
14514 |
View |
43 |
A new Approach for Averting Jamming Invasion with Packet Hiding Methods
|
M.Ramabai, E.Komalavalli |
294-297 |
16603 |
View |
44 |
Assessment of Predictive Object Points (POP) Values for Java Projects
|
Shubha Jain, Vijay Yadav, Raghuraj Singh |
298-301 |
17651 |
View |
45 |
Automatic Identification of Modal, Breathy and Creaky Voices
|
Poonam Sharma, Ajay Sharma |
302-306 |
15823 |
View |
46 |
Automatic Question Generation Using Software Agents for Technical Institutions
|
Shivank Pandey, K.C. Rajeswari |
307-311 |
19208 |
View |
47 |
Speed control of PMSM system using improved reaching law based sliding mode control and disturbance observer technique
|
Shital M.Wasu , U. B. Sarode , M. P. Bhavalkar |
312-318 |
14307 |
View |
48 |
Hybrid Cryptographic Processor for Secure Communication Using FPGA
|
Savitha Raj.S, Merlin Sharmila.A, Poorinima Beneta.P |
319-324 |
15672 |
View |
49 |
Smart System to Recognize EEG Signal for Finding Brain Diseases Using K-Means Clustering
|
K.Gomathi, D.Leela, S.Prasad |
325-329 |
17676 |
View |
50 |
Survey on Digital Watermarking on Medical Images
|
Kavitha K J, Reshma M |
330-335 |
18153 |
View |
51 |
Image Segmentation Using Two Step Splitting Function
|
Gopal Kumar Jha, Bhagwan Swaroop Sharma, Tribodh Tripathi |
336-343 |
11759 |
View |
52 |
Modified Multi Way Feedback Encryption Standard (MWFES) Ver-I
|
Prabal Banerjee, Purnendu Mukherjee, Asoke Nath |
344-351 |
10147 |
View |